Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy based adaptive two factor authentication having automated enrollment

Inactive Publication Date: 2005-01-27
LIU GOUPING
View PDF5 Cites 139 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0019] The advantages of such a method and apparatus are simplified enrollment by the user, simplified addition of authentication to an existing application, and transparent authentication once the user is enrolled.

Problems solved by technology

Such methods are subject to a variety of well known attacks and provide only limited security.
While the use of a PKI scheme, and digital certificates specifically, for strong authentication, is well known and relatively straight forward, the process of obtaining the certificates for use is sufficiently complex as to deter their use.
The process involves manual processing on the part of both the user and the Registration Authority and can involve delays while the request is reviewed and approved.
However, it is not widely utilized due in large part to the complexity and inconvenience involved.
The complexity typically occurs on the application side.
While API toolkits are provided for many PKI systems, significant effort is still required to implement the functionality required to provide certificate based authentication.
Accompanying this complexity is the expense associated with such an implementation and subsequent maintenance.
Inconvenience is found primarily on the user side.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy based adaptive two factor authentication having automated enrollment
  • Proxy based adaptive two factor authentication having automated enrollment
  • Proxy based adaptive two factor authentication having automated enrollment

Examples

Experimental program
Comparison scheme
Effect test

embodiment

PREFERRED EMBODIMENT

[0042] The disclosed invention is described below with reference to the accompanying figures in which like reference numbers designate like parts. Generally, numbers in the 200's refer to prior art elements or elements in the surrounding environment while numbers in the 100's refer to elements of the invention.

[0043] Overview

[0044] The inventive system presents a user friendly strong authentication system, and method of using, which is almost entirely transparent to the user. Activation of strong authentication is via one-click enrollment, after which authentication is performed by monitoring and intercepting messages used in the standard login sequence. User validation for purposes of enrollment is achieved by confirming successful logon to a client application. Encryption keys and a digital certificate are generated and stored through interaction between the user's browser and elements of the inventive system with no user involvement.

[0045] Until the user el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of and system for adding strong authentication to an existing network based application. A proxy based monitoring process screens data sent to and from a client application and intercepts login requests. These intercepted requests are redirected to an authentication process which first checks to see if the user logging in has enrolled in strong authentication. If not enrolled, the user is allowed to continue with a normal login. If enrolled, the user is authenticated by requesting digital identification data, such as a digital certificate, from the user's computer. If authentication succeeds, the user is allowed to proceed on to the normal login process. If authentication fails, the login attempt is blocked. User enrollment is automated, requiring no user interaction beyond the initial request. Verification for purposes of issuing a digital certificate, or other identifying data, is by means of confirming that the user being enrolled is currently logged in to the client application.

Description

BACKGROUND OF THE INVENTION [0001] 1. Field of the Invention [0002] The present invention relates to the field of entity authentication and specifically to authentication of users attempting to access a network accessible resource. Even more specifically it relates to such authentication methods and / or systems which automatically enroll users for a strong authentication method. [0003] 2. Background Information [0004] The conventional architecture of a network based application, as shown in FIG. 10, is now well known. The application server, 204, hosts the application and provides related services to distributed users such as user 200, via the network, 202. One major concern in such an environment is authenticating the identity of the user and specifically validating that the user has the claimed identity and is authorized to use or access the provided services. While the network in question is often the Internet, this is not required, either in general or for the present invention. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04K1/00H04L29/06
CPCH04L63/0281H04L63/0823H04L2463/082G06F21/46
Inventor LIU, GOUPING
Owner LIU GOUPING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products